GSM Security

I have decided to write on GSM security structure so that you people about the telecommunication world security, well before going to the main topic it is good to introduce the GSM. 
GSM or Global System For Mobile Communication is a digital cellular communication system that works on TDM(time-division multiplexing) and FDM(frequency division multiplexing) multiplexing technique, i will not discuss all the technique deeply because it is a another topic to be discussed, but it is necessary to review the design or structure of the system to whom we analyze.

The first generation 1G mobile network has a different vulnerability including eavesdropping and handset cloning than in GSM including protection against these vulnerability. Below is a diagram which shows the basic architecture of Global System For Mobile Communication (GSM).
Here ME is your mobile set and BTS (Base Transceiver station) is the local tower that connect your handset to the network and send your request to the BSC(Base Station Controller) than there is MSC (Mobile switching center) that is responsible for the switching and routing in MSC there are AuC (Authentication center) HLR (Home location register) VLR (Visitor Location Register) and EIR (Equipment identity register).
HLR and VLR is a database that stores user(handset) data, VLR is a variable database and stores data for a short period of time while HLR is a permanent database and contain all the records of user.
 GSM Security Basic  
The SIM (Subscriber Identity Module) is a small and smart card contain both programming and information. SIM contain a temporary cipher key for encryption, temporary subscriber identity(TIMSI) and International Mobile Subscriber Identity (IMSI). It also contain a PIN (Personal Identification Number) and a PUK (PIN unblocking key).
SIM stores a 128-bit authentication key provided by the service provider, IMSI is a unique 15-digit number that has a three part.
  • Mobile Country Code (MCC)
  • Mobile Network Code(MNC)
  • Mobile Subscriber Identity (MSIN)
The algorithm that has been implemented on SIM is A3 and A8 click here to learn A3 Algorithm   and A8 Algorithm.
 How The Network Identify SIM 
Ki is the 128-bit Individual Subscriber Authentication Key utilized as a secret key shared between the Mobile Station and the Home Location Register of the subscriber’s home network.
RAND is 128-bit random challenge generated by the Home Location Register.
SRES is the 32-bit Signed Response generated by the Mobile Station and the Mobile Services Switching Center.
Kc is the 64-bit ciphering key used as a Session Key for encryption of the over-the-air channel. Kc is generated by the Mobile Station from the random challenge presented by the GSM network and the Ki from the SIM utilizing the A8 algorithm.

Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...